Recommendations
Cites work
- scientific article; zbMATH DE number 1842485 (Why is no real title available?)
- scientific article; zbMATH DE number 1406785 (Why is no real title available?)
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Collusion-secure fingerprinting for digital data
- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
- Improving the round complexity of traitor tracing schemes
- Outsider-anonymous broadcast encryption with sublinear ciphertexts
- Pirate Evolution: How to Make the Most of Your Traitor Keys
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
Cited in
(7)- Efficient fully anonymous public-key trace and revoke with adaptive \textsf{IND-CCA} security
- A Revocation Scheme Preserving Privacy
- Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
- Asymptotically tight lower bounds in anonymous broadcast encryption and authentication
- Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption
- Arrangements of pseudocircles: triangles and drawings
- Mediated traceable anonymous encryption
This page was built for publication: Anonymous trace and revoke
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2349640)